First published: Tue May 09 2023(Updated: )
Vim. Multiple issues were addressed by updating Vim.
Credit: CVE-2023-2426 CVE-2023-2609 CVE-2023-2610 CVE-2023-2426 CVE-2023-2609 CVE-2023-2610 CVE-2023-2426 CVE-2023-2609 CVE-2023-2610 security@huntr.dev security@huntr.dev
Affected Software | Affected Version | How to fix |
---|---|---|
<13.5 | 13.5 | |
<12.6.8 | 12.6.8 | |
Apple macOS Big Sur | <11.7.9 | 11.7.9 |
Vim Vim | <9.0.1531 | |
Fedoraproject Fedora | =37 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2023-2609 is a vulnerability in the GitHub repository vim/vim prior to version 9.0.1531 that involves a NULL Pointer Dereference.
CVE-2023-2609 has a severity rating of high with a value of 5.5.
Versions of Vim prior to 9.0.1531 and Fedora 37 are affected by CVE-2023-2609.
To fix CVE-2023-2609, you should update Vim to version 9.0.1531 or later, or update Fedora to a version that includes the fix.
You can find more information about CVE-2023-2609 and the fix at the following references: [Reference 1](https://github.com/vim/vim/commit/d1ae8366aff286d41e7f5bc513cc0a1af5130aad), [Reference 2](https://huntr.dev/bounties/1679be5a-565f-4a44-a430-836412a0b622), and [Reference 3](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PCLJN4QINITA3ZASKLEJ64C5TFNKELMO/).